University of Oulu

Braeken, A., Kumar, P., Liyanage, M. et al. J Supercomput (2018) 74: 1695.

An efficient anonymous authentication protocol in multiple server communication networks (EAAM)

Saved in:
Author: Braeken, An1; Kumar, Pardeep2; Liyanage, Madhusanka3;
Organizations: 1INDI and ETRO Department, Vrije Universiteit Brussel, Brussels, Belgium
2Department of Computer Science, University of Oxford, Oxford, England
3Centre for Wireless Communications, University of Oulu, Oulu, Finland
4School of Electronics and Telecommunications, Hanoi University of Science and Technology, Hanoi, Vietnam
Format: article
Version: accepted version
Access: open
Online Access: PDF Full Text (PDF, 0.3 MB)
Persistent link:
Language: English
Published: Springer Nature, 2018
Publish Date: 2018-08-08


In a multi-server authentication environment, a user only needs to register once at a central registration place before accessing the different services on the different registered servers. Both, from a user point of view as for the management and maintenance of the infrastructure, these types of environments become more and more popular. Smartcard- or smartphone-based approaches lead to more secure systems because they offer two- or three-factor authentication, based on the strict combination of the user’s password, the user’s biometrics and the possession of the device. In this paper, we propose an efficient anonymous authentication protocol in multiple server communication networks, called the EAAM protocol, which is able to establish user anonymity, mutual authentication, and resistance against known security attacks. The novelty of the proposed scheme is that it does not require a secure channel during the registration between the user and the registration center and is resistant to a curious but honest registration system. These features are established in a highly efficient way with the minimum amount of communication flows between user and server during the establishment of the secret shared key and by using light-weight cryptographic techniques such as Chebyshev chaotic map techniques and symmetric key cryptography. The performance and security of the protocol are analyzed and compared with the latest new proposals in this field.

see all

Series: Journal of supercomputing
ISSN: 0920-8542
ISSN-E: 1573-0484
ISSN-L: 0920-8542
Volume: 74
Issue: 4
Pages: 1695 - 1714
DOI: 10.1007/s11227-017-2190-8
Type of Publication: A1 Journal article – refereed
Field of Science: 213 Electronic, automation and communications engineering, electronics
Copyright information: © Springer Science+Business Media, LLC, part of Springer Nature 2017. This is a post-peer-review, pre-copyedit version of an article published in J Supercomput. The final authenticated version is available online at: